Friday, June 5, 2020
Call us Toll Free (USA): 1-833-844-9468   International: +1-603-280-4451   M-F 8am to 6pm EST
Home News Page 3

News

Researchers disclose five Microsoft Windows zero-days

0
Security experts have disclosed five unpatched vulnerabilities in Microsoft Windows, four of which rated as high-risk severity. Security experts from Trend Micro’s Zero Day Initiative (ZDI) have published information on five unpatched vulnerabilities in Microsoft Windows. Four vulnerabilities are classified as...

ANALYSIS: Deception for the next generation – Attivo BOTsink

0
I have been using the Attivo BOTsink by AttivoNetworks as my primary deception platform in the lab for quite some time. I have found it perfect for collecting attacks and analyzing them. I upgraded to the current release -...

Moving Beyond Honeypots to Next-Generation Deception Technology

0
By Wade Lance, field CTO, Illusive NetworksWhen security professionals hear the word “deception,” they tend to immediately think of honeypots. That association needs to be updated. The concept of honeypots goes back a long way; IT security researchers began...

Both Mirai and Hoaxcalls IoT botnets target Symantec Web Gateways

0
Experts from Palo Alto Networks discovered that the Mirai and Hoaxcalls botnets are targeting a vulnerability in legacy Symantec Web Gateways. Palo Alto Networks Unit 42 researchers observed both the Mirai and Hoaxcalls botnets using an exploit for a post-authentication...

How Pizza Can Be the Recipe to Understand Cloud Security

0
By Yohanan Berros, Customer Operation Managers, XM CyberIt's not always easy to wrap your mind around the various layers of cloud security and how they differ from conventional on-premises computing. Fortunately, we've formulated a simple (and delicious) metaphor for...

Texas Department of Transportation (TxDOT) hit by a ransomware attack

0
A new ransomware attack hit the Texas government, the malware this time infected systems at the state’s Department of Transportation (TxDOT).The Texas government suffered two ransomware attacks in a few weeks, the first one took place on May 8,...

Economic Efficiency in Cyber Defense

0
By Mark Evans, VP Marketing, EndaceThe previous two articles in this series addressed Visibility and Agility as key requirements for stronger cyber defense. This last article in the series looks at the third leg of robust cybersecurity:  Economic Efficiency.According...

Why Finance Should Bank on Automating Security

0
By Faiz Shuja, co-founder & CEO at SIRPChallenger banks such as Monzo and Starling are shaking up the finance sector. Traditional bricks and mortar institutions are eyeing their success in offering customers quality services on a modest budget and...

Interserve UK defense contractor hacked, up to 100,000 past and present employees details exposed

0
Britain's Ministry of Defence contractor Interserve has been hacked, intruders have stolen up to 100,000 past and present employees' details.Interserve, a contractor for the Britain's Ministry of Defence suffered a security breach, hackers have stolen up to 100,000 of...

Enabling Agility to Accelerate Incident Response

0
By John Attala, Vice President of Worldwide Sales, EndaceIn the first article in this series, Endace VP of product management Cary Wright discussed the importance of end-to-end network visibility in protecting valuable enterprise data, and how the combination of...

STAY CONNECTED

35,442FansLike
56,055FollowersFollow

seczetta whitepaper